Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6636635rwb; Mon, 5 Dec 2022 15:34:13 -0800 (PST) X-Google-Smtp-Source: AA0mqf74SHtr7EGOsP8wCAbVH3HH6CZLOiNyOCvu2m3QfP8YrzzBeCBHabq/VkgT0P9uXsAh7UeZ X-Received: by 2002:a17:902:7d98:b0:17e:6852:1191 with SMTP id a24-20020a1709027d9800b0017e68521191mr77797354plm.159.1670283253159; Mon, 05 Dec 2022 15:34:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670283253; cv=none; d=google.com; s=arc-20160816; b=OfytvCnz4ebuWwgx4oLfSRN7kzWUnwyLtzMfK8JPYOhwM3gIiMLlRoRpofiyOLzi3v sNGHg/uWRkGo7QTKUbwpUEJnpumXOTTvCsonGSVPW1ffKQFxpLl2zvwQ0u1LcDeyOjGd /vKHME+mBKC/TUBjsh47Xn7DJU+uPP13ogLtx1/uQNMEii13gzR+7meZAPh8+s7cj3Q8 tqosdk4atXLcTApDewJrv7TYiGPaRL4AZJaSfcBWI85a9ePz5OH5QiShdPP3wL9L9zzX 26fsYj/IjDg6mAW9b2fOYnCFvBGkOrqs5g4WXoijIHeLcsfInAG+LZuoZ5S96wRESviT IzWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=iTzvLGTWLJU89YMgwwnvlvr5Kpl1FGcMOvQ/pbHMzbM=; b=LLHr5keBOQF/4VpScPnXSscGxvNPK9gfXRqWK1nwTo8nMlrJajQMzn20Vjktv+CPXL nzgstBR8elmUq1KQxqk9lvo1vhqGQJQBpjjXRfGgBkS6mw1vczssUrszmD8IGFD//9c5 VoHUEjMYgw+xdMv49eGdCKadBmkuTh1Dy6JIBWLRUgSWEOgN2R3HKUR0i24GdZx40qkH OC3WYNTT/WxHsF7jxG5A8ofbimYnmscgHGZ5G43gKcYbcGGYo+9gKZDu2qCUenVn9p8G RmlLOKXLpaF1OkCGuBbyVzVEVx9oLaF1oxJjl+H6gSm+deYYGfqmD8FGR+sOjET5wq0k I7+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=KyLc9GV6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o15-20020a635d4f000000b004707dd3280asi16116882pgm.204.2022.12.05.15.34.02; Mon, 05 Dec 2022 15:34:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=KyLc9GV6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231602AbiLEXXv (ORCPT + 79 others); Mon, 5 Dec 2022 18:23:51 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44066 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230228AbiLEXXs (ORCPT ); Mon, 5 Dec 2022 18:23:48 -0500 Received: from mail-pl1-x64a.google.com (mail-pl1-x64a.google.com [IPv6:2607:f8b0:4864:20::64a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0B4A01835A for ; Mon, 5 Dec 2022 15:23:48 -0800 (PST) Received: by mail-pl1-x64a.google.com with SMTP id z10-20020a170902ccca00b001898329db72so14818951ple.21 for ; Mon, 05 Dec 2022 15:23:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=iTzvLGTWLJU89YMgwwnvlvr5Kpl1FGcMOvQ/pbHMzbM=; b=KyLc9GV6/CUhfLU9IMoTcRlJBolS4+1t6RFTh27gP6FNWM6iBDARcbicN/NRlkk2pG WNxXokZ7XWgT0JLwBf+ynDuBAueLnOZ5JIBM2uEM3nLhWon+4dRxcWASghQUKXVxDKjH iaKcEiGQOXpuTi5eY8wv7Wwd79mDU7ZiXvV4EMZMOqU6gx6sdNTGEQU418uoFyU/MReQ 3x+tGwBIwIcdVA4w8/hE7fxnLR5UqQWJ3W2eLdCCykT3kmulLBLBFnzZskF851JmZWG5 ct+FjREgWuWF2RhVDJApm64ZCPyM015zcTrOuq8Y7uQ/+phMgvoX+mLMRifE6uAPHrVL 0O4w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=iTzvLGTWLJU89YMgwwnvlvr5Kpl1FGcMOvQ/pbHMzbM=; b=tgrblKIEIMK9Mus3E9M0QDmapTiFtXLRn2UGysLAO8JBVt4/9TzmpXTWrsxS87a0hr fzPGL/qWpzN5Wvd1/EV4XjBj4NBWn/iI/CtG6fJDZlIcK9p1QBUoYJee5ME2K9QtY8PP 2lqZESPOPJjRtt+MNQxQEvddUz0GOWUaP4j7N1CDygbOx4wmCWeUdzoSOgDVTzEIY/rn HYVck+r15rvP7tuvnfNTcYn+c+0f99+lRl6uk1+ZNi9S39gIT/FCd8aJJ1FPt9uDMgaP FP9LExDLnI2BrDPZ2c1lPZrs5e8eS3skSnCS2eE7aJFTouPcVlakh6f9N+OHZPH5eQZm hA9Q== X-Gm-Message-State: ANoB5plQV27lY75m1nrHudthCn8M65nDWOA+dMZUwRiKIsmNXglYyt7B UepkwAZ3gEGh9BmtxM3Az/C5vCeDc4O3O9WM X-Received: from vannapurve2.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:41f8]) (user=vannapurve job=sendgmr) by 2002:a17:90a:7d0f:b0:218:d50e:5af8 with SMTP id g15-20020a17090a7d0f00b00218d50e5af8mr67751305pjl.26.1670282627518; Mon, 05 Dec 2022 15:23:47 -0800 (PST) Date: Mon, 5 Dec 2022 23:23:35 +0000 Mime-Version: 1.0 X-Mailer: git-send-email 2.39.0.rc0.267.gcb52ba06e7-goog Message-ID: <20221205232341.4131240-1-vannapurve@google.com> Subject: [V2 PATCH 0/6] KVM: selftests: selftests for fd-based private memory From: Vishal Annapurve To: x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Cc: pbonzini@redhat.com, vkuznets@redhat.com, wanpengli@tencent.com, jmattson@google.com, joro@8bytes.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, shuah@kernel.org, yang.zhong@intel.com, ricarkol@google.com, aaronlewis@google.com, wei.w.wang@intel.com, kirill.shutemov@linux.intel.com, corbet@lwn.net, hughd@google.com, jlayton@kernel.org, bfields@fieldses.org, akpm@linux-foundation.org, chao.p.peng@linux.intel.com, yu.c.zhang@linux.intel.com, jun.nakajima@intel.com, dave.hansen@intel.com, michael.roth@amd.com, qperret@google.com, steven.price@arm.com, ak@linux.intel.com, david@redhat.com, luto@kernel.org, vbabka@suse.cz, marcorr@google.com, erdemaktas@google.com, pgonda@google.com, nikunj@amd.com, seanjc@google.com, diviness@google.com, maz@kernel.org, dmatlack@google.com, axelrasmussen@google.com, maciej.szmigiero@oracle.com, mizhang@google.com, bgardon@google.com, ackerleytng@google.com, Vishal Annapurve Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series implements selftests targeting the feature floated by Chao via: https://lore.kernel.org/lkml/20221202061347.1070246-10-chao.p.peng@linux.intel.com/T/ Below changes aim to test the fd based approach for guest private memory in context of normal (non-confidential) VMs executing on non-confidential platforms. private_mem_test.c file adds selftest to access private memory from the guest via private/shared accesses and checking if the contents can be leaked to/accessed by vmm via shared memory view before/after conversions. Updates in V2: 1) Simplified vcpu run loop implementation API 2) Removed VM creation logic from private mem library Updates in V1 (Compared to RFC v3 patches): 1) Incorporated suggestions from Sean around simplifying KVM changes 2) Addressed comments from Sean 3) Added private mem test with shared memory backed by 2MB hugepages. V1 series: https://lore.kernel.org/lkml/20221111014244.1714148-1-vannapurve@google.com/T/ This series has dependency on following patches: 1) V10 series patches from Chao mentioned above. Github link for the patches posted as part of this series: https://github.com/vishals4gh/linux/commits/priv_memfd_selftests_v2 Vishal Annapurve (6): KVM: x86: Add support for testing private memory KVM: Selftests: Add support for private memory KVM: selftests: x86: Add IS_ALIGNED/IS_PAGE_ALIGNED helpers KVM: selftests: x86: Add helpers to execute VMs with private memory KVM: selftests: Add get_free_huge_2m_pages KVM: selftests: x86: Add selftest for private memory arch/x86/kvm/mmu/mmu_internal.h | 6 +- tools/testing/selftests/kvm/.gitignore | 1 + tools/testing/selftests/kvm/Makefile | 2 + .../selftests/kvm/include/kvm_util_base.h | 15 +- .../testing/selftests/kvm/include/test_util.h | 5 + .../kvm/include/x86_64/private_mem.h | 24 ++ .../selftests/kvm/include/x86_64/processor.h | 1 + tools/testing/selftests/kvm/lib/kvm_util.c | 58 ++++- tools/testing/selftests/kvm/lib/test_util.c | 29 +++ .../selftests/kvm/lib/x86_64/private_mem.c | 139 ++++++++++++ .../selftests/kvm/x86_64/private_mem_test.c | 212 ++++++++++++++++++ virt/kvm/Kconfig | 4 + virt/kvm/kvm_main.c | 3 +- 13 files changed, 490 insertions(+), 9 deletions(-) create mode 100644 tools/testing/selftests/kvm/include/x86_64/private_mem.h create mode 100644 tools/testing/selftests/kvm/lib/x86_64/private_mem.c create mode 100644 tools/testing/selftests/kvm/x86_64/private_mem_test.c -- 2.39.0.rc0.267.gcb52ba06e7-goog